CN107610038B - Watermark display method, device and system - Google Patents

Watermark display method, device and system Download PDF

Info

Publication number
CN107610038B
CN107610038B CN201710911513.1A CN201710911513A CN107610038B CN 107610038 B CN107610038 B CN 107610038B CN 201710911513 A CN201710911513 A CN 201710911513A CN 107610038 B CN107610038 B CN 107610038B
Authority
CN
China
Prior art keywords
information
dot
watermark information
display
coding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710911513.1A
Other languages
Chinese (zh)
Other versions
CN107610038A (en
Inventor
袁亦征
漆昱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Technologies Co Ltd
Original Assignee
New H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New H3C Technologies Co Ltd filed Critical New H3C Technologies Co Ltd
Priority to CN201710911513.1A priority Critical patent/CN107610038B/en
Publication of CN107610038A publication Critical patent/CN107610038A/en
Application granted granted Critical
Publication of CN107610038B publication Critical patent/CN107610038B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The application provides a method, a device and a system for displaying a watermark, which relate to the technical field of information media, and the method comprises the following steps: determining watermark information to be added; acquiring a preset coding mode, wherein the preset coding mode comprises a display conversion relation between different characters and dot-shaped coding graphs; according to a preset coding mode, each character of the watermark information is converted into a discrete dot-shaped coding graph and is carried in a transparent floating window for displaying, wherein the transparent floating window is a floating window which is arranged on a display screen in advance.

Description

Watermark display method, device and system
Technical Field
The present application relates to the field of information media technologies, and in particular, to a method, an apparatus, and a system for displaying a watermark.
Background
With the rapid development of information digitization, digitization of information media provides great convenience for information access, and meanwhile, efficiency and accuracy of information expression are remarkably improved. However, the following side effect is that the security of the digital data files cannot be guaranteed in the circulation process, and the information is easily divulged through the modes of photographing, screen capturing, printing and the like.
In order to improve the security of data streaming, watermarking technology is introduced. The existing screen watermarking technology is generally a plain text watermarking, and a user can easily see the plain text watermarking and can easily erase key information after seeing the plain text watermarking, so that the added watermarking has no precautionary effect.
Although the existing screen plain text watermark adds a user ID capable of identifying the currently used system or PC machine on the user screen, for example, in the case of Zhang three login, the watermark is added in several positions of the screen with the name of "Zhang three". Then, when the picture is captured or photographed, the character of "three sheets" is printed on the picture. However, after the screenshot or the photographing is completed, the three-zhang watermark in the picture can be erased by using an editing tool, at this time, the personal information of the three-zhang is not available on the picture, and even if the modified picture is taken, the picture cannot be traced, namely the picture is generated by the three-zhang. Therefore, when the existing watermarking technology is used for adding watermarks to pictures, the security of data cannot be guaranteed due to poor concealment.
No effective solution has been proposed to the above problems.
Disclosure of Invention
In view of this, an object of the present application is to provide a method, an apparatus and a system for displaying a watermark, so as to alleviate the technical problem of low data security caused by poor concealment in the existing watermark technology.
In a first aspect, an embodiment of the present application provides a method for displaying a watermark, including: determining watermark information to be added; acquiring a preset coding mode, wherein the preset coding mode comprises a display conversion relation between different characters and dot-shaped coding graphs; and converting each character of the watermark information into a discrete dot-shaped coding graph according to the preset coding mode, and carrying the discrete dot-shaped coding graph in a transparent floating window for displaying, wherein the transparent floating window is a floating window which is preset on a display screen.
Further, according to the preset encoding mode, converting each character of the watermark information into a discrete dot-shaped encoding graph, and carrying the discrete dot-shaped encoding graph in a transparent floating window for displaying comprises: and converting each character in the watermark information to be added into a corresponding target dot-shaped coding graph according to the display conversion relation between different characters and dot-shaped coding graphs, and carrying the target dot-shaped coding graph in the transparent floating window for display.
Further, the method further comprises: dividing the transparent floating window into a plurality of display areas according to a display screen; displaying the watermark information in each of the plurality of display areas.
Further, the method further comprises: determining the number of bytes contained in the watermark information; determining a sub-display area for each byte in the display area based on the number of bytes.
Further, determining a sub-display area for displaying each byte based on the number of bytes comprises: dividing a display area of the watermark information into M sub-display areas, wherein M is the number of bytes in the watermark information; each sub-display area is used for displaying a target dot-shaped coding graph corresponding to one byte.
Further, still include: determining a target pixel point for displaying the target dot-like coded graph in the sub-display area based on the display conversion relation between different characters and the dot-like coded graph, wherein the target pixel point comprises a plurality of sub-pixel points; and displaying the target point-like coding graph through the target pixel points.
Further, displaying each target dot-like coding pattern through the plurality of sub-pixel points includes: and displaying the dot-like coding graph through the plurality of sub-pixel points according to at least one of preset color, transparency, shape and size.
Further, determining watermark information to be added includes: acquiring login information of a user, wherein the login information comprises: a terminal identifier of the logged-in terminal and/or a user name when logging in the terminal; adding the current time to the terminal identification and/or the user name to obtain plaintext information; and encrypting the plaintext information to obtain ciphertext information, and taking the ciphertext information as the watermark information.
Further, the method further comprises: acquiring image information to be processed and key information, wherein the image information comprises the watermark information; decrypting the watermark information in the image information through the key information to obtain login information; and determining user information for generating the image information according to the login information.
In a second aspect, an embodiment of the present application further provides a display apparatus for displaying a watermark, including: a determining unit configured to determine watermark information to be added; the device comprises an acquisition unit, a display unit and a processing unit, wherein the acquisition unit is used for acquiring a preset coding mode which comprises a display conversion relation between different characters and dot-shaped coding graphs; and the conversion unit is used for converting each character of the watermark information into a discrete dot-shaped coding graph according to the preset coding mode, and carrying the discrete dot-shaped coding graph in a transparent floating window for displaying, wherein the transparent floating window is a floating window which is arranged on a display screen in advance.
In a third aspect, an embodiment of the present application further provides a watermark display system, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps of the method recited in the above claims when executing the computer program.
In a fourth aspect, embodiments of the present application further provide a computer-readable medium having non-volatile program code executable by a processor, the program code causing the processor to perform the method of the claims.
In the embodiment of the application, watermark information to be added is determined firstly, and then a preset coding mode is obtained, wherein the preset coding mode comprises a display conversion relation between different characters and a dot-shaped coding graph; and finally, converting each character of the watermark information into a discrete dot-shaped coding graph according to a preset coding mode, and carrying the discrete dot-shaped coding graph in a transparent floating window for displaying. In the embodiment of the application, each character of the watermark information is converted into a discrete dot-shaped coding pattern, so that the visual interference of the watermark information on the content covered below can be reduced, and the purpose of protecting the data is achieved, and the technical problem of low data security caused by poor concealment of the existing watermark technology is further solved, thereby realizing the technical effect of improving the data security.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the application. The objectives and other advantages of the application will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the detailed description of the present application or the technical solutions in the prior art, the drawings needed to be used in the detailed description of the present application or the prior art description will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of a display method of a watermark according to an embodiment of the present application;
fig. 2 is a schematic diagram of a manner of encoding 16-ary watermark information according to an embodiment of the present application;
fig. 3 is a diagram illustrating a display effect of watermark information according to an embodiment of the present application;
FIG. 4 is a schematic interface diagram of a decoding tool according to an embodiment of the present application;
fig. 5 is a schematic diagram illustrating an effect of decoding watermark information by a decoding tool according to an embodiment of the present application;
FIG. 6 is a schematic diagram of a display device for a watermark according to an embodiment of the present application;
fig. 7 is a schematic diagram of a display system of a watermark according to an embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions of the present application will be clearly and completely described below with reference to the accompanying drawings, and it is obvious that the described embodiments are some, but not all embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The first embodiment is as follows:
according to an embodiment of the present application, there is provided an embodiment of a method for displaying a watermark, it should be noted that the steps shown in the flowchart of the figure may be executed in a computer system such as a set of computer executable instructions, and that although a logical order is shown in the flowchart, in some cases, the steps shown or described may be executed in an order different from that here.
Fig. 1 is a flowchart of a method for displaying a watermark according to an embodiment of the present application, and as shown in fig. 1, the method includes the following steps:
step S102, determining watermark information to be added;
in this embodiment of the application, the watermark information to be added may be obtained by the server, where the watermark information is encrypted information (that is, ciphertext information described below). Specifically, in this embodiment of the application, the server may determine the watermark information to be added when detecting that the user logs in the operating system, where the watermark information may be ciphertext information generated by the server in real time, and a specific generation process will be described in detail in the following embodiment.
Step S104, acquiring a preset coding mode, wherein the preset coding mode comprises a display conversion relation between different bytes and dot-shaped coding graphs;
in the embodiment of the present application, when the watermark information is represented as a 16-ary numerical value, the preset encoding manner is as shown in fig. 2. In the encoding method shown in fig. 2, 16 dot matrix maps are included, each dot matrix map corresponds to a dot coding pattern of one character, and two dot coding patterns correspond to one byte, that is, in the encoding method, the display conversion relationship between different characters and dot coding patterns is included.
Optionally, in order to facilitate computer recognition, in the embodiment of the present application, each character in 16-ary system is encoded according to the logical arrangement process shown in fig. 2. Of course, the specific encoding rules may vary.
Step S106, converting each character of the watermark information into a discrete dot-shaped coding graph according to the preset coding mode, and carrying the discrete dot-shaped coding graph in a transparent floating window for displaying, wherein the transparent floating window is a floating window which is preset on a display screen;
in the embodiment of the present application, a completely transparent window (i.e., a transparent floating window) may be made on the screen by using a graphics Device interface gdi (graphics Device interface), where the size of the window is the size of the virtual desktop of the computer operating system displayed on the display screen.
In the embodiment of the application, after the server acquires the preset encoding mode, each character of the watermark information can be converted into a discrete dot-shaped encoding graph, and the converted dot-shaped encoding graph is displayed on the transparent floating window.
Optionally, each character in the watermark information to be added may be converted into a corresponding target dot-shaped encoding graph according to a display conversion relationship between different characters and dot-shaped encoding graphs, and the target dot-shaped encoding graph is carried in the transparent floating window for display.
For example, the characters of the watermark information are expressed as: 25684671ACDB, wherein each two characters occupy one byte, therefore the watermark information includes the following bytes: 25. 68, 46, 71, AC and DB. In the embodiment of the present application, as shown in fig. 2, the display conversion relationship between different characters and dot-shaped coding patterns may be used to convert each byte into a corresponding target dot-shaped coding pattern; then, the target dot code pattern is displayed on the transparent floating window.
It should be noted that the watermark information may be displayed on the entire display screen, and the watermark information may also be displayed in a partial area of the display screen, and the specific display area may be set and modified according to actual needs.
In the embodiment of the present application, the method described in the above step S102 to step S106 may be performed by a server. Wherein the server is a server of a certain service system. For example, when the user logs in the operating system AAA through the terminal device, the server providing services for the operating system AAA executes the above steps S102 to S106 to display the watermark information on the display screen of the terminal device according to the above-described encoding method.
In the embodiment of the application, watermark information to be added is determined firstly, and then a preset coding mode is obtained, wherein the preset coding mode comprises a display conversion relation between different characters and a dot-shaped coding graph; and finally, converting each character of the watermark information into a discrete dot-shaped coding graph according to a preset coding mode, and carrying the discrete dot-shaped coding graph in a transparent floating window for displaying. In the embodiment of the application, each character of the watermark information is converted into a discrete dot-shaped coding pattern, so that the visual interference of the watermark information on the content covered below can be reduced, and the purpose of protecting the data is achieved, and the technical problem of low data security caused by poor concealment of the existing watermark technology is further solved, thereby realizing the technical effect of improving the data security.
In an optional implementation manner of the embodiment of the present application, the specific process of determining the watermark information to be added in step S102 is described as follows:
firstly, when a user logs in an operating system, user login information is obtained, wherein the login information comprises: a terminal identification of the logged-in terminal and a user name when logging in the terminal;
the terminal identifier is identification information capable of uniquely representing a logged-in terminal, wherein the terminal identifier may be MAC address information of the logged-in terminal, and may also be a terminal name (i.e., a computer name) of the logged-in terminal. The user name when logging in the terminal may be the job number of the user, or an administeror name preset in the terminal by the user.
Optionally, the current time may be added to the terminal identifier and/or the user name to obtain plaintext information; the current time may be acquired at intervals of a preset period, and then the watermark information may be generated, that is, the watermark information may change with the change of time.
Optionally, in order to correctly trace the photographing time, the acquisition of the standard time in the network may be triggered under the condition of network connection. And finally, encrypting the plaintext information to obtain ciphertext information, and taking the ciphertext information as watermark information.
In the embodiment of the application, when the server detects that the user logs in the operating system, the server first obtains the terminal identifier of the terminal where the user logs in and the user name when the terminal logs in through the interface of the operating system.
Then, the current time is added to at least one of the terminal identification and the user name to obtain plaintext information. For example, the terminal identifier and the user name are spliced end to end into a whole string, and the splicing information is obtained. And after splicing information is obtained by splicing, adding the current time into the splicing information, and taking the obtained whole character string as plaintext information.
After obtaining the plaintext information, encrypting the plaintext information by using a target encryption method (e.g., a 3DES encryption method) to obtain encrypted data, where the encrypted data may be binary data. If the encrypted data is binary data, the encrypted data may be transformed, for example, 16-ary transformed, 10-ary transformed or 8-ary transformed, so as to obtain corresponding ciphertext information, and the ciphertext information after being transformed is used as watermark information.
As is well known, 16-ary data is represented as: 0. 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F. Therefore, if the watermark information is 16-ary ciphertext information, the watermark information is composed of some or all of the 16 characters, wherein two adjacent characters constitute one byte. Therefore, in the embodiment of the present application, if the watermark information is 16-ary ciphertext information, when encoding the watermark information, the 16 characters are encoded in advance.
For 16-ary watermark information, a preset encoding mode is as shown in a dot matrix diagram shown in fig. 2, each character can be divided into 8 blocks with 4 rows and 2 columns for display, and in the dot matrix diagram, each column can only display one block. Thus, there are 4 choices per column, and according to the multiplication principle, there are 4 x 4 or 16 choices for 2 columns. The 16 choices correspond to 16 characters in 16 systems. As can be seen from fig. 2, when the 16-ary character is "0", the dot code pattern is displayed in the first square in the first column and the first square in the second column of the dot matrix chart, respectively. When the 16-ary character is "1", the dot code pattern is displayed in the first square of the first column and the second square of the second column of the dot matrix chart, respectively. And by analogy, during display, the position arrangement of the dot-shaped patterns forms the code display of the 16-system-bit different characters, and the dot-shaped patterns after being coded (arranged) are dot-shaped code patterns.
That is, when the watermark information is displayed in the transparent floating window, the dot-shaped encoded pattern is displayed at the corresponding position of the transparent floating window in the display mode of the corresponding dot matrix diagram.
It should be further noted that, if the watermark information is 8-ary ciphertext information, at this time, the bitmap may be divided into 6 blocks of 3 rows and 2 columns, and then each character in the 8-ary bitmap is encoded according to the logical arrangement process shown in fig. 2, so as to obtain an encoding mode of each character in the 8-ary bitmap, which is not described in detail herein.
In this embodiment of the application, after the preset encoding mode is set in advance, the target dot-shaped encoding graph corresponding to each character in the watermark information to be added may be displayed on the transparent floating window according to the methods described in the above steps S102 to S106. When the target dot-shaped coding graph is displayed on the transparent floating window, the display area of the watermark information can be determined firstly.
In an optional implementation manner of the embodiment of the present application, the watermark display area may be determined in two ways, where a first way is to use a partial area in the display screen as the watermark display area, and a second way is to use the entire area in the display screen as the watermark display area. These two modes will be separately described below.
Mode I, display mode of partial area
In the embodiment of the present application, the partial region may be any one region in the display screen, and the region is a preset region. When displaying the watermark information by the first mode, the server displays the target dot-like coded graph obtained by the conversion in the partial area.
Mode two, display mode of all regions
In the embodiment of the present application, when the display area is the whole area of the display screen, the following steps are performed:
firstly, dividing the transparent floating window into a plurality of display areas according to a display screen;
then, the watermark information is displayed in each of the plurality of display areas.
Specifically, each display region displays the watermark information according to the discrete dot-like coding pattern in the above embodiment, which is not described in detail again.
In the embodiment, a plurality of redundant watermarks are used for displaying, so that when a photographer traces back, if one or more watermark information is unclear, other watermark information is used for identifying. In addition, after the watermark information is converted into the discrete dot-shaped coding graph, even if a plurality of watermark information are displayed, the vision of a user is still not influenced, and the user is ensured not to influence the reading of the information below the floating window.
In the embodiment of the application, the transparent floating window can be divided into a plurality of display areas according to a certain division preset rule, wherein the plurality of display areas can be set according to actual needs. The plurality of display areas may be regular display areas or irregular display areas.
For example, the display screen may be divided into N1 × N2 display regions, N1 and N2 being integers greater than 0, and N1 and N2 being equal or not; then, watermark information is displayed in each of the N1 × N2 display areas. That is, the target dot-like encoded pattern of each character in the watermark information is displayed in each of the N1 × N2 display areas. There are N1 × N2 identical watermark information for the entire display screen.
In the embodiment of the present application, in order to implement the functions of resisting interference and attack, the entire display screen is divided into N1 × N2 display areas, and then each display area is used as a display area of watermark information (i.e., a ciphertext display area). After the display screen is divided into N1 × N2 display areas, watermark information can be displayed in each display area.
Specifically, in dividing the entire display screen into N1 × N2 display areas, the length and width of the entire display screen are first acquired, and then the entire display screen is divided into N1 × N2 display areas of equal size, each as a display area of watermark information.
In this embodiment of the application, after the display area of the watermark information is determined by the first or second method, the watermark information may be displayed in the display area.
Before displaying watermark information in a display area, firstly, determining the number of bytes contained in the watermark information; then, a sub-display area for each byte is determined in the display area based on the number of bytes.
It should be noted that there are many ways to determine the sub-display area of each byte in the display area based on the number of bytes, and in the embodiment of the present application, the sub-display area of each byte may be determined according to the following method:
dividing a display area of the watermark information into M sub-display areas, wherein M is the number of the bytes; each sub-display area is used for displaying a target dot-shaped coding graph corresponding to one byte.
In another alternative embodiment, the display area of the watermark information may be divided into M display areas of M1 × M2, and each of the M display areas may be regarded as a byte display area.
It should be noted that the values of M1 and M2 can be determined according to the following rules: the product of M1 and M2 is M, M1 and M2 are both integers greater than 0, and the difference between M1 and M2 is minimal. For example, the number of bytes is 8, and at this time, according to the above rule, the value of M1 is determined to be 4, and the value of M2 is determined to be 2. The dot-shaped coding pattern is displayed in a regular array form, and particularly, decoding and reading of watermark information are facilitated during manual examination.
After dividing the display area of the watermark information into M sub-display areas, determining a target pixel point for displaying a target dot-like coded graph in the sub-display areas based on the display conversion relation between different characters and the dot-like coded graph, wherein the target pixel point comprises a plurality of sub-pixel points; and then, displaying each target point-like coding graph through a plurality of sub-pixel points.
For example, as can be seen from the encoding method diagram shown in fig. 2, each dot-like encoded pattern corresponding to each dot-like pattern includes two sub dot-like encoded patterns, that is, each byte in the watermark information includes 4 sub dot-like encoded patterns in the target dot-like encoded pattern. At this time, the 4 sub dot-like code patterns need to be discretely displayed in the corresponding sub display regions. When the 4 sub dot-like encoded patterns are discretely displayed in the corresponding sub display regions, a target pixel point for displaying each sub dot-like encoded pattern in the target dot-like encoded pattern needs to be determined in the sub display regions. Each sub-point-like coding graph in the target point-like coding graph corresponds to one target pixel point, and one target pixel point comprises a plurality of sub-pixel points. After the target pixel point is determined, each sub-point-like coding graph in the target point-like coding graph can be displayed through the target pixel point.
It should be noted that, in general, one target pixel includes 2 to 25 sub-pixels. That is, each sub dot-like code pattern in the target dot-like code pattern may be displayed by 2 to 25 pixel points. By adjusting the number of the sub-pixel points in the target pixel point, the optimal visual effect can be determined, and therefore the visual perception of a user in use is guaranteed not to be influenced.
It should be noted that, in the embodiment of the present application, M bytes may be displayed in the M sub-display areas according to the precedence order of each byte in the watermark information. Specifically, the target dot-like coding pattern may be displayed by the target pixel point according to at least one of a preset color, a preset transparency, a preset shape and a preset size.
For example, a hexadecimal string is: 0123456789ABCDEF, the number of bytes contained in the string is 16 ÷ 2 ═ 8, that is, in the display area of each watermark information, 16 ÷ 2 ═ 8 sub-display areas are included. Of these, 01 is the display content of the first sub-display region, 23 is the display content of the second sub-display region, and … … and EF are the display contents of the eighth sub-display region. And the 2 hexadecimal bits in each sub-display area are arranged from left to right according to the sequence, for example, 01 is 0 on the left, and 1 on the right. And when the watermark information is displayed, the display area of the whole watermark information is averagely divided into 4 x 2 sub-display areas, and the content of each sub-display area is sequentially displayed from the top left to the right and then from the top down.
In the embodiment of the present application, as shown in fig. 3, a display effect diagram of watermark information is shown. If the watermark information is converted according to the encoding method shown in fig. 2, the effect graph shown in fig. 3 is displayed. As can be seen from fig. 3, first, the transparent floating window on the display screen is divided into 4 × 2 8 display areas, where watermark information is displayed in each display area. And as can be seen from fig. 3, each display region includes 12 sub-display regions of 6 × 2, that is, the watermark information includes 12 bytes. Further, as can be seen from fig. 3, each sub-display area is used for displaying each byte in the watermark information. That is, in each sub-display region, a target dot-like code pattern for displaying individual bytes of watermark information.
In this embodiment of the application, after an image carrying the watermark information is leaked, a technician may track a leaked person by decoding the watermark information.
In another alternative embodiment, tracking a compromised person by decoding watermark information comprises the steps of:
firstly, acquiring image information to be processed and key information, wherein the image information comprises watermark information; the key information corresponds to the key used in encryption as mentioned in the above embodiments.
Then, the watermark information in the image information is decrypted through the key information, and the login information is obtained through decryption;
and finally, determining user information for generating image information according to the login information.
In this embodiment of the application, a user may input key information through an interface as shown in fig. 4 and fig. 5, and then, after acquiring the key information, the server decrypts the watermark information in the image information to obtain plaintext information of the watermark information. As can be seen from the above description, the plaintext information of the watermark information is composed of the user name of the login terminal, the terminal identifier of the terminal that the user logs in, and the current time of the system. After the watermark information is decrypted to obtain plaintext information, the user name, the terminal identification and the current time of the system can be obtained through decryption.
Specifically, after obtaining the image information on which the above-described watermark information is superimposed, the user opens the decoding tool shown in fig. 4, and inputs the key information in the order from the top left to the bottom right according to the encoding shown in fig. 2. Then, the bitmap can be restored to the original information by clicking decryption. For example, in fig. 3, there are 8 identical ciphertexts, each of which is arranged in the same way, and the arrangement of the corresponding target dot-shaped coding pattern can be found according to the definition of the picture, and then, key information can be input by clicking a button in the tool, for example, input 41354812F34012F 3404148. Can a click "meet a character that is actually unrecognizable? "instead. And after all the input is finished, the decryption button is clicked to finish the decryption of the character points. The decryption effect is shown in fig. 5, wherein the user name and the terminal identification are connected to form a character string, and then the character string is added to the back if the password has redundant positions, so that redundancy is formed again in a large block, and the anti-attack effect is better.
As can be seen from fig. 3, since the watermark information exhibits the watermark in a manner of "lightweight micro" marking, it is nearly equivalent to an "invisible watermark". If screen shooting or screen capture is available, once a divulgence event occurs, the divulgence personnel can be quickly locked through watermark information on the divulgence photo. The punctiform watermark information has the characteristics of folding resistance, redundant backup, moire pattern resistance and the like, namely, the audit of the watermark information and the positioning of a divulgence source cannot be influenced no matter how the picture is compressed, optimized and folded. The leaked person can be locked only by inputting watermark information in a decoding tool for inquiring. If the obtained divulged pictures are not complete enough, the system can also support the query of the result with the highest accuracy.
In summary, as can be seen from the above description, in the embodiments of the present application, the method mainly has the following advantages:
firstly, the watermark information completely contains plaintext information, and decoding is not required to be carried out by relying on other information;
secondly, the color, the size, the transparency and the redundancy of a plurality of parts of target symbols in the watermark information can be configured, so that the optimal configuration can be achieved according to the actual condition;
third, even if most of the content in the image information including the watermark information is altered, the content of the remaining portion can be restored, and the content of the remaining portion can be estimated from the information in reality.
Aiming at 16-system watermark information, the method provided by the embodiment of the application only needs to contain 4 dot-shaped coding graphs, and the data information such as the name of the terminal, the user name, the current time of the system and the like can be displayed on the display screen of the terminal. The vector watermark formed by the watermark coding mode has higher coding efficiency, is attached to a screen, has stronger concealment and has smaller interference to a user. By using the method provided by the embodiment of the application, the redundancy is higher, and even if the obtained leaked pictures are not complete enough, the system can also support the query of the result with the highest accuracy.
Example two:
the embodiment of the present application further provides a display apparatus of a watermark, where the display apparatus of a watermark is mainly used to execute the display method of a watermark provided in the foregoing content of the embodiment of the present application, and the following provides a detailed description of the display apparatus of a watermark provided in the embodiment of the present application.
Fig. 6 is a schematic diagram of a display device of a watermark according to an embodiment of the present application, and as shown in fig. 6, the display device of the watermark mainly includes: a first determination unit 10, an acquisition unit 20, and a conversion display unit 30, wherein:
a first determining unit 10, configured to determine watermark information to be added;
an obtaining unit 20, configured to obtain a preset coding mode, where the preset coding mode includes a display conversion relationship between different characters and a dot-shaped coding pattern;
and the conversion display unit 30 is configured to convert each character of the watermark information into a discrete dot-shaped encoded pattern according to the preset encoding mode, and display the discrete dot-shaped encoded pattern carried in a transparent floating window, where the transparent floating window is a floating window preset on a display screen.
In the embodiment of the application, watermark information to be added is determined firstly, and then a preset coding mode is obtained, wherein the preset coding mode comprises a display conversion relation between different characters and a dot-shaped coding graph; and finally, converting each character of the watermark information into a discrete dot-shaped coding graph according to a preset coding mode, and carrying the discrete dot-shaped coding graph in a transparent floating window for displaying. In the embodiment of the application, each character of the watermark information is converted into a discrete dot-shaped coding pattern, so that the visual interference of the watermark information on the content covered below can be reduced, and the purpose of protecting the data is achieved, and the technical problem of low data security caused by poor concealment of the existing watermark technology is further solved, thereby realizing the technical effect of improving the data security.
Optionally, the conversion display unit is configured to: and converting each character in the watermark information to be added into a corresponding target dot-shaped coding graph according to the display conversion relation between different characters and dot-shaped coding graphs, and carrying the target dot-shaped coding graph in the transparent floating window for displaying.
Optionally, the conversion display unit 30 is further configured to: dividing the transparent floating window into a plurality of display areas according to a display screen; displaying the watermark information in each of the plurality of display areas.
Optionally, the apparatus further includes: a second determining unit configured to determine the number of bytes included in the watermark information; a third determining unit configured to determine a sub-display area of each byte in the display area based on the number of bytes.
Optionally, the third determining unit is configured to: dividing a display area of the watermark information into M sub-display areas, wherein M is the number of bytes in the watermark information; each sub-display area is used for displaying a target dot-shaped coding graph corresponding to one byte.
Optionally, the apparatus further comprises: a fourth determining unit, configured to determine, based on the display conversion relationship between different characters and a dot-shaped encoded graph, a target pixel point for displaying the target dot-shaped encoded graph in the sub-display region, where the target pixel point includes a plurality of sub-pixel points; and the display unit is used for displaying the target point-like coding graph through the target pixel point.
Optionally, the display unit is configured to: and displaying the target point-like coding graph through the target pixel points according to at least one of preset color, transparency, shape and size.
Optionally, the first determining unit is configured to: acquiring login information of a user, wherein the login information comprises: a terminal identifier of the logged-in terminal and/or a user name when logging in the terminal; adding the current time to the terminal identification and/or the user name to obtain plaintext information; and encrypting the plaintext information to obtain ciphertext information, and taking the ciphertext information as the watermark information.
Optionally, the apparatus further includes a decryption module, configured to: acquiring image information to be processed and key information, wherein the image information comprises the watermark information; decrypting the watermark information in the image information through the key information to obtain login information; and determining user information for generating the image information according to the login information.
The device provided by the embodiment of the present application has the same implementation principle and technical effect as the foregoing method embodiments, and for the sake of brief description, reference may be made to the corresponding contents in the foregoing method embodiments where no part of the device embodiments is mentioned.
The display device of the watermark provided by the embodiment of the application has the same technical characteristics as the display method of the watermark provided by the embodiment, so that the same technical problems can be solved, and the same technical effects can be achieved.
Example three:
referring to fig. 7, an embodiment of the present application further provides a display system 100 for watermarks, including: a processor 70, a memory 71, a bus 72 and a communication interface 73, wherein the processor 70, the communication interface 73 and the memory 71 are connected through the bus 72; the processor 70 is arranged to execute executable modules, such as computer programs, stored in the memory 71.
The Memory 71 may include a high-speed Random Access Memory (RAM) and may further include a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. The communication connection between the network element of the system and at least one other network element is realized through at least one communication interface 73 (which may be wired or wireless), and the internet, a wide area network, a local network, a metropolitan area network, and the like can be used.
The bus 72 may be an ISA bus, PCI bus, EISA bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 7, but this does not indicate only one bus or one type of bus.
The memory 71 is configured to store a program, and the processor 70 executes the stored program after receiving an execution instruction, and the method executed by the apparatus defined by the flow process disclosed in any embodiment of the foregoing application may be applied to the processor 70, or implemented by the processor 70.
The processor 70 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 70. The Processor 70 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the device can also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA), or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory 71, and the processor 70 reads the information in the memory 71 and completes the steps of the method in combination with hardware thereof.
In addition, in the description of the embodiments of the present application, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present application can be understood in a specific case by those of ordinary skill in the art.
In the description of the present application, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of description and simplicity of description, and do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the present application. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
The computer program product of the method, the apparatus, and the system for displaying a watermark provided in the embodiments of the present application includes a computer-readable storage medium storing a non-volatile program code executable by a processor, where instructions included in the program code may be used to execute the method described in the foregoing method embodiments, and specific implementation may refer to the method embodiments, and will not be described herein again.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a non-volatile computer-readable storage medium executable by a processor. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present application, and are used for illustrating the technical solutions of the present application, but not limiting the same, and the scope of the present application is not limited thereto, and although the present application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope disclosed in the present application; such modifications, changes or substitutions do not depart from the spirit and scope of the exemplary embodiments of the present application, and are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (9)

1. A method for displaying a watermark, comprising:
determining watermark information to be added; the watermark information is obtained by encrypting the login information of the user and the current time;
acquiring a preset coding mode; the preset coding mode comprises display conversion relations between different characters and dot-shaped coding graphs, the dot-shaped coding graphs of the different characters are obtained by arranging the positions of the dot-shaped graphs, and each dot-shaped coding graph comprises two sub dot-shaped coding graphs;
determining each byte of the watermark information, and respectively converting two characters contained in each byte of the watermark information into corresponding dot coding patterns based on the display conversion relation between different characters and dot coding patterns to obtain target dot coding patterns of each byte;
determining a sub-display area of each byte in the display area of the transparent floating window based on the number of bytes of the watermark information; the transparent floating window is a floating window which is arranged on a display screen in advance, and each sub-display area is used for displaying a target point-like coding graph of one byte;
and when the image carrying the watermark information is leaked, decrypting the watermark information to obtain user login information.
2. The method of claim 1, further comprising:
dividing the transparent floating window into a plurality of display areas according to a display screen;
displaying the watermark information in each of the plurality of display areas.
3. The method of claim 1, wherein determining the sub-display region of each byte in the display region of the transparent floating window based on the number of bytes contained in the watermark information comprises:
and dividing the display area of the watermark information into M sub-display areas, wherein M is the number of bytes in the watermark information.
4. The method of claim 3, further comprising:
determining a target pixel point for displaying the target dot-like coded graph in the sub-display area based on the display conversion relation between different characters and the dot-like coded graph, wherein the target pixel point comprises a plurality of sub-pixel points;
and displaying the target point-like coding graph through the target pixel points.
5. The method of claim 4, wherein displaying each of the target point-like encoded patterns by the plurality of sub-pixel points comprises:
and displaying the target point-like coding graph through the target pixel points according to at least one of preset color, transparency, shape and size.
6. The method of claim 1, wherein determining watermark information to be added comprises:
obtaining login information of a user, wherein the login information comprises: a terminal identifier of the logged-in terminal and/or a user name when logging in the terminal;
adding the current time to the terminal identification and/or the user name to obtain plaintext information;
and encrypting the plaintext information to obtain ciphertext information, and taking the ciphertext information as the watermark information.
7. The method of claim 1, wherein decrypting the watermark information to obtain user login information comprises:
acquiring image information to be processed and key information, wherein the image information comprises the watermark information;
decrypting the watermark information in the image information through the key information to obtain login information;
the method further comprises the following steps:
and determining user information for generating the image information according to the login information.
8. A watermarked display device, comprising:
a first determining unit configured to determine watermark information to be added; the watermark information is obtained by encrypting the login information of the user and the current time;
the device comprises an acquisition unit, a coding unit and a coding unit, wherein the acquisition unit is used for acquiring a preset coding mode; the preset coding mode comprises display conversion relations between different characters and dot-shaped coding graphs, the dot-shaped coding graphs of the different characters are obtained by arranging the positions of the dot-shaped graphs, and each dot-shaped coding graph comprises two sub dot-shaped coding graphs;
the conversion display unit is used for determining each byte of the watermark information, and respectively converting two characters contained in each byte of the watermark information into corresponding dot-shaped coding graphs on the basis of the display conversion relation between different characters and dot-shaped coding graphs to obtain a target dot-shaped coding graph of each byte; determining a sub-display area of each byte in the display area of the transparent floating window based on the number of bytes of the watermark information; the transparent floating window is a floating window which is arranged on a display screen in advance, and each sub-display area is used for displaying a target point-like coding graph of one byte; and when the image carrying the watermark information is leaked, decrypting the watermark information to obtain user login information.
9. A watermarked display system comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the method of any one of the preceding claims 1 to 7 when executing the computer program.
CN201710911513.1A 2017-09-29 2017-09-29 Watermark display method, device and system Active CN107610038B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710911513.1A CN107610038B (en) 2017-09-29 2017-09-29 Watermark display method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710911513.1A CN107610038B (en) 2017-09-29 2017-09-29 Watermark display method, device and system

Publications (2)

Publication Number Publication Date
CN107610038A CN107610038A (en) 2018-01-19
CN107610038B true CN107610038B (en) 2022-05-10

Family

ID=61067224

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710911513.1A Active CN107610038B (en) 2017-09-29 2017-09-29 Watermark display method, device and system

Country Status (1)

Country Link
CN (1) CN107610038B (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110120003B (en) * 2018-02-07 2023-01-20 上海诺亚投资管理有限公司 Method and system for acquiring webpage with watermark
CN110322385B (en) * 2018-03-28 2021-08-24 浙江大学 Watermark embedding and extracting method and device and electronic equipment
CN109146759A (en) * 2018-07-23 2019-01-04 深圳市联软科技股份有限公司 A kind of forming method, device, medium and the equipment of figure watermark
CN109767375B (en) * 2018-12-06 2022-12-13 北京北信源信息安全技术有限公司 Image watermark embedding and tracing method and system
CN109801205B (en) * 2018-12-21 2022-02-25 苏宁易购集团股份有限公司 Traceable implicit watermark adding method and device
CN111415169A (en) * 2019-01-04 2020-07-14 广州哨马智能装备科技有限公司 Method and system for safely transferring products
CN110148100A (en) * 2019-05-10 2019-08-20 腾讯科技(深圳)有限公司 A kind of image conversion method, device, storage medium and computer equipment
CN110428356B (en) * 2019-07-22 2023-04-28 中孚安全技术有限公司 Paper printed part hidden watermark tracing method, system, terminal and storage medium
CN110838083A (en) * 2019-11-11 2020-02-25 闻泰通讯股份有限公司 Watermark adding method, device, equipment and storage medium
CN111680273B (en) * 2020-05-21 2023-07-07 北京北信源软件股份有限公司 Watermark embedding method, watermark embedding device, electronic equipment and readable storage medium
CN113139163B (en) * 2021-04-15 2023-05-26 上海上讯信息技术股份有限公司 Method and device for generating watermark information on application program interface
CN114924819A (en) * 2022-05-09 2022-08-19 阿里巴巴(中国)有限公司 Watermark synthesis method, cloud desktop server, client and computer readable storage medium
CN117173000A (en) * 2023-09-08 2023-12-05 广州市科帕电子科技有限公司 Information hiding method and system based on quaternary coding

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005093653A1 (en) * 2004-03-25 2005-10-06 Sanyo Electric Co., Ltd Image correcting device and method, image correction database creating method, information data providing device, image processing device, information terminal, and information database device
CN104778589A (en) * 2015-03-24 2015-07-15 立德高科(北京)数码科技有限责任公司 Method and device for binding data in combination-type anti-fake label
CN105141409A (en) * 2015-08-12 2015-12-09 深圳市联软科技有限公司 Method, terminal and server for realizing screen digital watermarks
CN105306479A (en) * 2015-11-11 2016-02-03 江苏中威科技软件系统有限公司 Computer data embedding method, computer data displaying method and computer data embedding and displaying device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005093653A1 (en) * 2004-03-25 2005-10-06 Sanyo Electric Co., Ltd Image correcting device and method, image correction database creating method, information data providing device, image processing device, information terminal, and information database device
CN104778589A (en) * 2015-03-24 2015-07-15 立德高科(北京)数码科技有限责任公司 Method and device for binding data in combination-type anti-fake label
CN105141409A (en) * 2015-08-12 2015-12-09 深圳市联软科技有限公司 Method, terminal and server for realizing screen digital watermarks
CN105306479A (en) * 2015-11-11 2016-02-03 江苏中威科技软件系统有限公司 Computer data embedding method, computer data displaying method and computer data embedding and displaying device

Also Published As

Publication number Publication date
CN107610038A (en) 2018-01-19

Similar Documents

Publication Publication Date Title
CN107610038B (en) Watermark display method, device and system
JP5192039B2 (en) Electronic document processing system, method and program
CN101529888B (en) Image encryption/decryption device, and method
KR101074951B1 (en) Image encryption device, image decryption device, method, and recording medium
US8430329B2 (en) Two-dimensional code publishing program and two-dimensional code decoding program
CN101540823B (en) Image processing apparatus and image processing system and method
US8948385B2 (en) Electronic document encrypting system, decrypting system, program and method
CN106599964A (en) Two-dimensional code generation and verification method and device
US20100316222A1 (en) Image processing system
CN105577684A (en) Anti-crawling methods, server, client and system
Wang et al. 2D barcodes for visual cryptography
KR101608184B1 (en) Authentication server, authentication system, authentication method, and program
CN109190340A (en) A kind of webpage digital watermarking generates, identification, Method of printing and device
CN101625752B (en) Image processing apparatus and image processing method
Lee et al. Selective scalable secret image sharing with verification
JP2007096663A (en) Image processor and control method thereof, computer program, and computer-readable storage medium
CN115527101A (en) Image tampering detection method and processor
US9591173B2 (en) System and method for digital analysis of authenticity and integrity of documents using portable devices
US11276138B2 (en) Image data encryption and rendering system
JP6617302B1 (en) Optical code, optical code generation method and program thereof, and optical code reading method and program thereof
CN114626968A (en) Watermark embedding method, watermark extracting method and device
JP6706451B2 (en) Device, method, and program therefor for verifying electronic signature
WO2010061456A1 (en) Information processing device, information processing method and image processing program
WO2017130711A1 (en) Electronic signature management system
CN107679601B (en) Graphic code structure with three-dimensional decryption body and method for scanning graphic code structure

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant